Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5321
ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT
Published 2016-06-01“…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
Get full text
Article -
5322
THE EXPERIENCE OF COMBATING THE SHADOW ECONOMY IN THE EUROPEAN COUNTRIES
Published 2018-01-01“…In the first place among them is the modernization of the tax and social security systems. Long-term initiatives in the field of creating «e-government», in particular electronic payments in the public sector are one of the most important elements in changing the «old habits» of using cash.…”
Get full text
Article -
5323
Cybercrimes: A Proposed Taxonomy and Challenges
Published 2018-01-01“…We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity. …”
Get full text
Article -
5324
Context-aware and self-adaptive trust model for pervasive computing
Published 2012-11-01“…To cope with the behaviour trust problems emerging at ve environments,a context-aware and selfadaptive trust model(CASATM) for pervasive environments was proposed,the trust model provided security protection based on service content adaptively at various level,nd be sensitive to contexts such as time,location and service content.A simple and efficient risk evaluation model was presented to initialize trust value to unknown entities which was a common phenomenon in pervasive environments.Simulation results testify to the contexts awareness of this model,as well as resistance of periodically cheating behaviour from malicious entity.…”
Get full text
Article -
5325
L’offre alimentaire urbaine face au défi de la diffusion des supermarchés. Regards croisés sur Rio de Janeiro et Brasilia
Published 2023-06-01“…These case studies shed light on the profiles of the main groups involved, their localization strategies and marketing segmentation related to the socio-economic characteristics of the population, and food and nutrition security.…”
Get full text
Article -
5326
FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA
Published 2023-08-01“…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
Get full text
Article -
5327
Neither Peace nor War—U.S.-Cuban Political Coexistence from 1963 to 1964
Published 2023-07-01“…A political coexistence of the two states, under managed conditions of neither peace nor war, assured the benefits of reasonable security and long-term international credibility as well as political identity to both the United States and Cuba.…”
Get full text
Article -
5328
Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control
Published 2014-11-01“…According to the root cause analysis, telephone fraud mechanism and behavior characteristics were discussed, network security model and the control system were researched, the recommending of core network number protection ability to ascend was proposed, and a set of early warning and intercept technology system based on big data model of signaling was developed. …”
Get full text
Article -
5329
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01“…With the fast development of Internet,there were more and more network access methods and network services.But too many accounts were inconvenient for users to perform the AAA(authentication,authorization and accounting),and many service providers hadn’t appropriate AAA mechanisms.In order to solve these problems,the smart AAA was introduced.The architecture of the smart AAA was designed,and SOAP based SAML was used to exchange security information between smart AAA and other service providers.Analysis indicates the smart AAA will provide the universal and intelligent AAA services for both users and operators.…”
Get full text
Article -
5330
Tag dynamic ownership transfer protocol for multi-owner with weights
Published 2017-04-01“…A dynamic ownership transfer protocol of RFID tag based on Lagrange algorithm was proposed to achieve the transfer for multi-owner with different weights.When the ownership of a tag changed,the agreement could recover the original secret key to verify the legitimacy of the owners,and use secret sharing algorithm to redistribute sub-key according to the new weights of the owners to make the security and flexibility of the ownership transfer improved.The simulation is carried out to show that it adapts to a low-cost RFID tag because the calculation and time consuming are low in the protocol.…”
Get full text
Article -
5331
Keeping a Household Inventory and Protecting Valuable Records
Published 2003-07-01“…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
Get full text
Article -
5332
Analysis of some key technical problems in the development of computing power network
Published 2022-06-01“…The current development status of domestic and foreign computing power network technology was introduced.The key technology of the computing power network was described.The problems which were encountered in the development and practice of the computing power network technology were deeply analyzed from five aspects and the preliminary solutions were proposed.The five aspects include the computing power measurement and computing power modeling, the routing decision based on the computing power information, the computing power collaboration of cloud-edge-end, the integration of cloud and network based on service, and the computing power network information security.…”
Get full text
Article -
5333
Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications
Published 2025-01-01“…This study pioneers a unified security solution for Drone-to-Drone (D2D) and Drone-to-Base Station (D2BS) communications, filling a crucial IoD security gap. …”
Get full text
Article -
5334
Phosphogypsum as Fertilizer: Impacts on Soil Fertility, Barley Yield Components, and Heavy Metals Contents
Published 2024-12-01“…Fertilization is a critical input factor in crop production and food security achievement. Therefore, fertilization is a critical input factor in crop production and food security achievement. …”
Get full text
Article -
5335
Experience-based food insecurity in Bangladesh: Evidence from Household Income and Expenditure Survey 2022
Published 2025-01-01“…Key factors found to be significantly associated with food security include the wealth index, land ownership, education of the household head, family size, remittance income and exposure to shocks. …”
Get full text
Article -
5336
Enabling smart parking for smart cities using Internet of Things (IoT) and machine learning
Published 2025-01-01“…This eliminates the need for security personnel to verify vehicle identities or stickers manually, streamlining access procedures. …”
Get full text
Article -
5337
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01“…We also introduce a reference framework to achieve demonstrable data lineage and provenance, contrasting it with Secure Computing, a related but differently orientated form of computing. …”
Get full text
Article -
5338
A study on the optimal allocation of photovoltaic storage capacity for rural new energy microgrids based on double-layer multi-objective collaborative decision-making
Published 2025-01-01“…First, an outer optimization objective function containing constraints on capacity allocation, line transmission security, charging and discharging power of the energy storage system, microgrid security, and power supply reliability was constructed, and an inner optimization objective function containing constraints on energy storage self-discharge correction and power balance was constructed. …”
Get full text
Article -
5339
Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges
Published 2024-09-01“…However, significant challenges are addressed, including data security, interoperability, and reliable internet connectivity in various healthcare settings. …”
Get full text
Article -
5340
Assessment of post-harvest fish losses at the fishers’ level in Lake Tana, Ethiopia
Published 2025-01-01“…Fish are essential for ensuring food and nutrition security; and economic growth. However, post-harvest loss poses a significant challenge in the value chain due to the perishable nature of fish. …”
Get full text
Article